Please enable JavaScript to use CodeHS

Standards Mapping

for Colorado 9-12

130

Standards in this Framework

77

Standards Mapped

59%

Mapped to Course

Standard Lessons
CS.HS.1.1a
Identify and create different types of algorithms (sort, search, etc.).
  1. AP Computer Science Principles in JavaScript
  2. 1.5 Functions in Karel
  3. 1.20 Karel Challenges
  4. 5.1 Functions and Parameters 1
  5. 5.4 Functions and Return Values 1
  6. 7.6 Finding an Element in a List
  7. Fundamentals of Cybersecurity
  8. 14.1 More Filtering Practice
  9. 14.2 Ordering Results
  10. 14.4 Joining Tables
CS.HS.1.1b
Predict the outcome of different types of algorithms.
  1. AP Computer Science Principles in JavaScript
  2. 1.13 If/Else Statements
  3. 1.14 While Loops in Karel
  4. 4.4 If Statements
  5. 4.11 Loop and a Half
  6. Fundamentals of Cybersecurity
  7. 13.3 Looping
  8. 13.4 Branching
CS.HS.1.1c
Create or adapt algorithms to solve problems for multiple purposes (e.g., personal interests, stakeholder needs).
  1. AP Computer Science Principles in JavaScript
  2. 5.1 Functions and Parameters 1
  3. 5.4 Functions and Return Values 1
  4. 18.1 Intro to Design Thinking
  5. 18.4 Project Prep and Development
CS.HS.1.1d
Use an algorithm that involves mathematical operations and functions to solve problems.
  1. AP Computer Science Principles in JavaScript
  2. 3.6 Basic Math in JavaScript
CS.HS.1.1e
Use an iterative approach to utilizing and/or developing an algorithm.
  1. AP Computer Science Principles in JavaScript
  2. 4.6 For Loops in JavaScript
  3. 4.7 General For Loops
  4. 4.8 For Loop Practice
  5. 4.10 While Loops
  6. 4.11 Loop and a Half
CS.HS.1.1f
Recognize problems that cannot be solved computationally.
  1. AP Computer Science Principles in JavaScript
  2. 8.10 Cryptography
CS.HS.1.1g
Identify and describe algorithms that exist within their personal lives.
  1. AP Computer Science Principles in JavaScript
  2. 1.7 Top Down Design and Decomposition in Karel
  3. 3.2 Uses of Programs
CS.HS.1.2a
Illustrate the flow of execution of an iterative algorithm (e.g., recursion).
  1. AP Computer Science Principles in JavaScript
  2. 1.11 For Loops
  3. 4.6 For Loops in JavaScript
  4. 4.10 While Loops
CS.HS.1.2b
Explain the value of heuristic algorithms to model ways to solve problems.
CS.HS.1.2c
Adapt algorithms used in one problem to solve a related or different problem.
  1. AP Computer Science Principles in JavaScript
  2. 5.4 Functions and Return Values 1
  3. 5.5 Functions and Return Values 2
CS.HS.1.2d
Use multiple methods to represent an algorithm (e.g., diagram, programming language, unplugged).
  1. AP Computer Science Principles in JavaScript
  2. 1.7 Top Down Design and Decomposition in Karel
  3. 1.17 Karel Algorithms
  4. Fundamentals of Cybersecurity
  5. 13.6 Organizational Techniques
CS.HS.1.3a
Describe pros and cons of the performance of algorithms for the same task.
  1. AP Computer Science Principles in JavaScript
  2. 1.20 Karel Challenges
  3. 4.11 Loop and a Half
CS.HS.1.3b
Use an iterative approach to developing an algorithm.
  1. AP Computer Science Principles in JavaScript
  2. 1.7 Top Down Design and Decomposition in Karel
  3. 1.17 Karel Algorithms
CS.HS.1.3c
Test and troubleshoot so that algorithms produce reasonable results.
  1. AP Computer Science Principles in JavaScript
  2. 1.7 Top Down Design and Decomposition in Karel
  3. 1.9 Abstraction
  4. 1.16 Debugging Strategies
CS.HS.1.4a
Demonstrate how the process of decomposition is iterative and used to solve problems.
  1. AP Computer Science Principles in JavaScript
  2. 1.7 Top Down Design and Decomposition in Karel
  3. 1.9 Abstraction
CS.HS.1.4b
Formulate possible solutions based on the decomposition of a problem.
  1. AP Computer Science Principles in JavaScript
  2. 1.7 Top Down Design and Decomposition in Karel
CS.HS.1.5a
Describe how abstraction is central to computational thinking.
  1. AP Computer Science Principles in JavaScript
  2. 1.9 Abstraction
CS.HS.1.5b
Identify and prioritize the most relevant parts of a problem while filtering out extraneous details.
  1. AP Computer Science Principles in JavaScript
  2. 1.7 Top Down Design and Decomposition in Karel
  3. 1.9 Abstraction
CS.HS.1.5c
Demonstrate different ways to represent key problem components.
  1. AP Computer Science Principles in JavaScript
  2. 1.7 Top Down Design and Decomposition in Karel
  3. 1.20 Karel Challenges
CS.HS.1.6a
Identify different types of data that are exchanged and produced by computers (e.g., protocols).
  1. AP Computer Science Principles in JavaScript
  2. 11.7 Packets and Protocols
  3. Fundamentals of Cybersecurity
  4. 5.6 Routing and Packets
  5. 5.7 How Do Websites Work?
CS.HS.1.6b
Evaluate the trade-offs for how data elements are organized and where data are stored (e.g., PNG/GIF, structured/unstructured).
  1. AP Computer Science Principles in JavaScript
  2. 8.8 Data Compression
  3. 8.9 Lossy Compression
  4. Fundamentals of Cybersecurity
  5. 5.3 Encoding Images in Binary
CS.HS.1.6c
Compare and contrast various data structures/techniques for storing and processing data (e.g., arrays, lists, tables).
  1. AP Computer Science Principles in JavaScript
  2. 3.4 Variables
  3. 7.1 Intro to Lists/Arrays
  4. 7.2 Indexing Into an Array
  5. 33.1 Intro to Objects/Maps
  6. Fundamentals of Cybersecurity
  7. 13.5 Arrays and Objects
CS.HS.1.7a
Provide multiple versions of data visualization in order to deepen problem analysis.
  1. AP Computer Science Principles in JavaScript
  2. 13.1 Getting Started with Data
  3. 13.2 Visualizing and Interpreting Data
CS.HS.1.7b
Interpret and analyze data to make informed decisions.
  1. AP Computer Science Principles in JavaScript
  2. 13.2 Visualizing and Interpreting Data
  3. 13.3 Data Collection & Limitations
  4. 14.1 Present a Data-Driven Insight
CS.HS.1.8a
Analyze computer output in different forms (e.g., plain text, CSV, graphs, images).
  1. AP Computer Science Principles in JavaScript
  2. 13.2 Visualizing and Interpreting Data
  3. 14.1 Present a Data-Driven Insight
CS.HS.1.8b
Design visualizations using the appropriate tool(s) with the end user in mind.
  1. AP Computer Science Principles in JavaScript
  2. 14.1 Present a Data-Driven Insight
  3. 18.1 Intro to Design Thinking
  4. 18.2 Prototype
  5. 18.3 Test
  6. 18.4 Project Prep and Development
CS.HS.1.8c
Provide multiple versions of data visualization in order to deepen problem analysis.
  1. AP Computer Science Principles in JavaScript
  2. 13.1 Getting Started with Data
  3. 13.2 Visualizing and Interpreting Data
  4. 14.1 Present a Data-Driven Insight
CS.HS.2.1a
Describe key protocols and underlying processes of internet-based services, (e.g., https) and discuss impact of technology change on communication protocols.
  1. AP Computer Science Principles in JavaScript
  2. 11.3 Internet Addresses
  3. 11.4 Viewing Websites
  4. 11.5 DNS
  5. 11.7 Packets and Protocols
  6. 11.10 The Impact of the Internet
CS.HS.2.1b
Illustrate and describe the basic components and various network types and topologies (e.g., personal, local, metropolitan, and wide).
  1. AP Computer Science Principles in JavaScript
  2. 11.2 Internet Hardware
  3. Fundamentals of Cybersecurity
  4. 6.4 Storage Options
CS.HS.2.1c
Explain the difference between decimal, hexadecimal, octal and binary number formats and how they are used in computing environments.
  1. AP Computer Science Principles in JavaScript
  2. 8.2 Number Systems
  3. 8.3 Encoding Text with Binary
  4. 8.4 Pixel Images
  5. 8.5 Hexadecimal
  6. 8.6 Pixel Colors!
  7. 8.7 Image Manipulation
CS.HS.2.2a
Explain the difference between memory and disk storage, internal and external storage, Random Access Memory (RAM), flash, cloud.
  1. AP Computer Science Principles in JavaScript
  2. 11.2 Internet Hardware
  3. Fundamentals of Cybersecurity
  4. 6.1 Internal Components
  5. 6.4 Storage Options
CS.HS.2.2b
Explain how to maintain safety when working on PCs, e.g., electromagnetic precautions.
  1. Fundamentals of Cybersecurity
  2. 8.5 Environmental Controls
CS.HS.2.2c
Describe how computing devices are engineered for fault tolerance and reliability, and identify potential sources of weakness (e.g., redundant power supplies, RAID, SAN/NAS connections).
  1. Fundamentals of Cybersecurity
  2. 5.6 Routing and Packets
CS.HS.2.3a
Identify and differentiate between different kinds of software (e.g., operating systems vs. applications) and their purposes.
  1. Fundamentals of Cybersecurity
  2. 4.6 Software and Applications
CS.HS.2.3b
Explain what an operating system is, and why it is important for a computer or computing device (e.g., Linux, Windows, iOS).
  1. Fundamentals of Cybersecurity
  2. 4.1 Operating Systems
  3. 4.3 Comparing Operating Systems
CS.HS.2.3c
Describe how software interacts with hardware to complete tasks.
  1. Fundamentals of Cybersecurity
  2. 4.6 Software and Applications
CS.HS.2.4a
Explain the integration of hardware, software and network communications components to create a networked system.
  1. AP Computer Science Principles in JavaScript
  2. 11.2 Internet Hardware
  3. Fundamentals of Cybersecurity
  4. 6.1 Internal Components
CS.HS.2.4b
Summarize security approaches using a systems approach perspective
  1. AP Computer Science Principles in JavaScript
  2. 11.9 Cybersecurity
  3. Fundamentals of Cybersecurity
  4. 4.8 Application Security
  5. 4.9 Browser Configuration
CS.HS.2.5a
Identify stakeholder’s problems/needs.
  1. AP Computer Science Principles in JavaScript
  2. 18.1 Intro to Design Thinking
  3. Fundamentals of Cybersecurity
  4. 7.2 Troubleshooting Methodology
  5. 7.3 Building a Knowledge Base
  6. 7.4 Star in a Video!
CS.HS.2.5b
Articulate design requirements back to stakeholder.
  1. AP Computer Science Principles in JavaScript
  2. 18.2 Prototype
  3. 18.3 Test
CS.HS.2.5c
Illustrate options for considerations and develop conceptual model.
  1. AP Computer Science Principles in JavaScript
  2. 18.2 Prototype
CS.HS.2.5d
Perform system analysis based on stakeholder considerations.
  1. Fundamentals of Cybersecurity
  2. 6.6 Lab: Design a Distribution Frame
  3. 16.5 Create a Service Agreement
CS.HS.2.6a
Describe elements of an effective backup system.
  1. Fundamentals of Cybersecurity
  2. 6.4 Storage Options
CS.HS.2.6b
Compare backup systems for computer users, or a network.
  1. Fundamentals of Cybersecurity
  2. 6.4 Storage Options
CS.HS.2.6c
List the various backup methodologies (e.g., full, differential), and why one would pick one over the other, or use all.
  1. Fundamentals of Cybersecurity
  2. 6.4 Storage Options
CS.HS.2.6d
Explain the ways an organization would continue to operate in light of a systems failure.
  1. Fundamentals of Cybersecurity
  2. 8.7 Risky Business
CS.HS.2.7a
Identify examples of threats to systems and data.
  1. AP Computer Science Principles in JavaScript
  2. 8.10 Cryptography
  3. 11.9 Cybersecurity
  4. Fundamentals of Cybersecurity
  5. 4.8 Application Security
CS.HS.2.7b
Describe the process by which intruders gain entry into a production system (e.g., reconnaissance).
  1. Fundamentals of Cybersecurity
  2. 8.3 Security in Coding
  3. 8.4 Dev Tools Capture the Flag
  4. 8.6 Checking for Vulnerabilities
CS.HS.2.7c
Describe and compare methods to test/validate how well systems and data are protected.
  1. Fundamentals of Cybersecurity
  2. 8.4 Dev Tools Capture the Flag
  3. 8.6 Checking for Vulnerabilities
CS.HS.2.7d
Investigate different career pathways relating to systems security.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
CS.HS.3.1a
Analyze and apply a design methodology to identify constraints and requirements of an identified problem.
  1. AP Computer Science Principles in JavaScript
  2. 18.1 Intro to Design Thinking
  3. 18.2 Prototype
  4. 18.3 Test
  5. 18.4 Project Prep and Development
CS.HS.3.1b
Utilize tools and resources such as pseudocode, flowcharts, wireframes, etc., as part of the design process.
  1. AP Computer Science Principles in JavaScript
  2. 1.7 Top Down Design and Decomposition in Karel
  3. 3.1 What is Code
  4. Fundamentals of Cybersecurity
  5. 13.6 Organizational Techniques
CS.HS.3.1c
Determine and use graphical or text-based languages.
  1. AP Computer Science Principles in JavaScript
  2. 1.1 Welcome to AP CSP
  3. 3.1 What is Code
  4. 3.3 Hello World
  5. Fundamentals of Cybersecurity
  6. 4.11 Command Line Interface
  7. 6.11 Network Management
  8. 13.3 Looping
  9. 13.4 Branching
CS.HS.3.1d
Understand and apply core programming concepts.
  1. AP Computer Science Principles in JavaScript
  2. 3.4 Variables
  3. 3.5 User Input
  4. 3.6 Basic Math in JavaScript
  5. 4.1 Booleans
  6. 4.2 Logical Operators
  7. 4.3 Comparison Operators
  8. 4.4 If Statements
  9. 4.7 General For Loops
  10. 4.10 While Loops
  11. 5.1 Functions and Parameters 1
  12. 5.2 Functions and Parameters 2
  13. 5.3 Functions and Parameters 3
  14. 5.4 Functions and Return Values 1
  15. 5.5 Functions and Return Values 2
  16. 5.6 Local Variables and Scope
  17. 7.1 Intro to Lists/Arrays
  18. 7.5 Iterating Over an Array
  19. Fundamentals of Cybersecurity
  20. 13.3 Looping
  21. 13.4 Branching
CS.HS.3.2a
Write code per selected design.
  1. AP Computer Science Principles in JavaScript
  2. 2.1 Practice PT: Pair-Programming Paint!
  3. 6.1 Project: Tell a Story
  4. 10.1 Practice PT: Create an Image Filter!
  5. Fundamentals of Cybersecurity
  6. 13.3 Looping
  7. 13.4 Branching
CS.HS.3.2b
Create code comments to communicate to other developers and ensure documentation of code.
  1. AP Computer Science Principles in JavaScript
  2. 1.8 Commenting Your Code
  3. Fundamentals of Cybersecurity
  4. 13.6 Organizational Techniques
CS.HS.3.2c
Use various troubleshooting and debugging techniques to improve code.
  1. AP Computer Science Principles in JavaScript
  2. 1.7 Top Down Design and Decomposition in Karel
  3. 1.8 Commenting Your Code
  4. 1.16 Debugging Strategies
  5. 1.18 How to Indent Your Code
CS.HS.3.2d
Create appropriate variables to store and retrieve data.
  1. AP Computer Science Principles in JavaScript
  2. 3.4 Variables
CS.HS.3.3a
Integrate collaborative strategies to improve programming outputs.
  1. AP Computer Science Principles in JavaScript
  2. 2.1 Practice PT: Pair-Programming Paint!
CS.HS.3.3b
Identify and analyze a variety of collaborative tools (e.g., commenting, development repositories) in order to determine the appropriateness for intended use.
  1. AP Computer Science Principles in JavaScript
  2. 1.8 Commenting Your Code
  3. 2.1 Practice PT: Pair-Programming Paint!
CS.HS.3.3c
Identify strategies such as peer reviews to test and refine artifacts in development.
  1. AP Computer Science Principles in JavaScript
  2. 2.1 Practice PT: Pair-Programming Paint!
CS.HS.3.3d
Determine when to use standard software tools like APIs, libraries, version control repositories, etc.
  1. AP Computer Science Principles in JavaScript
  2. 1.10 Super Karel
  3. 3.7 Using Graphics in JavaScript
CS.HS.3.4a
Understand and apply principles of stakeholder-based design.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
CS.HS.3.4b
Guide/advise stakeholders on strategies and solutions best suited for their problem (i.e., type of platform).
  1. Fundamentals of Cybersecurity
  2. 4.2 Lab: Configuring a Computer
  3. 4.4 Compatibility
  4. 4.6 Software and Applications
CS.HS.3.4c
Construct effective methods for gathering feedback from stakeholder.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
  4. 7.3 Building a Knowledge Base
CS.HS.3.4d
Respond to feedback from stakeholders to improve computing solutions.
  1. Fundamentals of Cybersecurity
  2. 7.1 Communication is Key!
  3. 7.2 Troubleshooting Methodology
CS.HS.3.4e
Create and share product support documentation for potential users.
  1. Fundamentals of Cybersecurity
  2. 7.3 Building a Knowledge Base
  3. 7.4 Star in a Video!
CS.HS.3.4f
Articulate lessons learned as a result of the design and creation process.
  1. AP Computer Science Principles in JavaScript
  2. 2.1 Practice PT: Pair-Programming Paint!
  3. 6.1 Project: Tell a Story
  4. 10.1 Practice PT: Create an Image Filter!
  5. 18.4 Project Prep and Development
CS.HS.3.5a
Investigate and understand privacy, security and protection laws.
  1. Fundamentals of Cybersecurity
  2. 1.4 Cyber Ethics and Laws
CS.HS.3.5b
Articulate the importance of securing personal data information on encrypted storage systems.
  1. AP Computer Science Principles in JavaScript
  2. 11.9 Cybersecurity
  3. Fundamentals of Cybersecurity
  4. 2.4 Authentication Methods
  5. 8.1 Data as a Resource
CS.HS.3.5c
Identify and analyze current events to ensure the safety, security and wellbeing of all potential stakeholders and end users.
  1. Fundamentals of Cybersecurity
  2. 1.7 Common Cyber Attacks and Prevention
  3. 6.9 Lab: Mobile Device Connectivity
CS.HS.3.5d
Identify influential computing innovations, and identify the beneficial and harmful effects they have had, or could have, on society, economy and culture.
  1. AP Computer Science Principles in JavaScript
  2. 11.10 The Impact of the Internet
CS.HS.3.5e
Discuss and explain how diversity of design and issues of accessibility impact a wide-range of users.
  1. AP Computer Science Principles in JavaScript
  2. 18.1 Intro to Design Thinking
CS.HS.3.5f
Demonstrate ways to improve the accessibility of computational technologies and artifacts.
  1. AP Computer Science Principles in JavaScript
  2. 18.2 Prototype
  3. 18.3 Test
  4. 18.4 Project Prep and Development
CS.HS.3.6a
Describe how software licensing influences program development.
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
CS.HS.3.6b
Investigate and develop solutions that discourage online software piracy.
  1. Fundamentals of Cybersecurity
  2. 4.7 Software Licenses
CS.HS.3.6c
Explore and integrate security measures such as encryption, authentication and verification strategies to secure developed computer programs.
  1. Fundamentals of Cybersecurity
  2. 2.4 Authentication Methods
CS.HS.3.6d
Research and abide by intellectual property laws and patents.
  1. AP Computer Science Principles in JavaScript
  2. 11.10 The Impact of the Internet
  3. 11.11 Creative Credit & Copyright
  4. Fundamentals of Cybersecurity
  5. 4.7 Software Licenses
CS.HS.4.1a
Define confidentiality, integrity and availability in the context of cybersecurity, and share a basic example of each.
CS.HS.4.1b
Analyze real-life scenarios to identify which of the core principles are at risk or have been compromised and explain why.
CS.HS.4.1c
Critically analyze case studies of cyber security incidents and identify where breaches in CIA have occurred.
CS.HS.4.1d
Research real-world examples of cyber security breaches and share their findings, focusing on how CIA principles were impacted.
CS.HS.4.2a
Compare and contrast applications based on their privacy policies and permissions, evaluating the impact on individuals and society.
CS.HS.4.2b
Synthesize understanding of privacy practices to inform peers on healthy vs harmful practices.
CS.HS.4.2c
Explain the individual risks of a data breach to an organization housing personal data. (Department of Homeland Security (DHS) through CISA Grant given to Cyber.org, 2021)
CS.HS.4.2d
Compare and contrast the harms and benefits between ensuring privacy and enabling convenience and usability (Dark, Daugherty, Emry, Massey, & Peyrot, 2021)
CS.HS.4.2e
Compare and contrast situations where one would want to be anonymous vs. identifiable and provide an example where one party desires anonymity but the other party desires clear identification.
CS.HS.4.2f
Discuss and/or give an example of how privacy decisions made today may have negative implications in the future.
CS.HS.4.2g
Describe one or more systems used on a regular basis which reveals information about a user’s pattern of life.
CS.HS.4.2h
Explain why trying every possible combination (a brute force attack) will always break encryption if given enough time.
CS.HS.4.2i
Describe ways encryption is used today.
CS.HS.4.2j
Evaluate strengths and weaknesses of an encryption method in context.
CS.HS.4.3a
Build a list of common threats students face and explain how an adversary may try to exploit those threats (adversarial thinking).
CS.HS.4.3b
Analyze real-life scenarios to identify which of the core principles are at risk or have been compromised and explain why. (This covers “Demonstrate adversarial thinking for a given problem. example: attack trees”)
CS.HS.4.3c
Explain how social behaviors and human factors can impact the cybersecurity of a system design. (Dark, Daugherty, Emry, Massey, & Peyrot, 2021)
CS.HS.4.3d
Evaluate digital habits and practices to identify potential risks and predict how an adversary might seek to exploit vulnerabilities.
CS.HS.4.3e
Analyze the motives of threat actors (Dark, Daugherty, Emry, Massey, & Peyrot, 2021)
CS.HS.4.3f
Explain the variety of ways in which a security vulnerability could be created and exploited (for example: system error, social engineering, or input by an adversary).
CS.HS.4.3g
Explain the difference between protecting against a random failure versus protecting against an intentional attack.
CS.HS.4.3h
Give an example of a system where the risk of a potential incident requires a high degree of security and an example where the risk of a potential compromise requires only a minor degree of security
CS.HS.5.1a
Explain the evolution of AI, the scope and limitations of current AI and the future of AI.
CS.HS.5.1b
Describe the purpose of different AI tools.
CS.HS.5.1c
Explain the potential ethical dilemmas and biases in developing, training, and using AI tools.
CS.HS.5.1d
Distinguish between AI and general computer programming.
CS.HS.5.1e
Describe real-world applications of AI, such as personal assistants, recommendation systems, advertising systems, and autonomous vehicles.
CS.HS.5.1f
Examine the differences between narrow AI and general AI, and their implications.
CS.HS.5.1g
Discuss the use of the term “learning” with respect to specific AI tools and techniques.
CS.HS.5.1h
Evaluate the kinds of data that can be used for AI problems and how they are used to train AI models.
CS.HS.5.1i
Evaluate, select and use appropriate AI technology to solve a problem.
CS.HS.5.2a
Develop and evaluate an AI-based solution to address a real-world objective.
CS.HS.5.2b
Describe how AI can create novel outcomes by identifying patterns in data from the domain of interest.
CS.HS.5.3a
Explain the potential limitations of AI; for example, insufficient or inaccurate data inputs, inability of the system to recognize its own errors, and flaws in the underlying algorithms.
CS.HS.5.3b
Evaluate the results produced by an AI tool before using it.
CS.HS.5.3c
Discuss challenges and considerations of AI with respect to personal privacy.
CS.HS.5.3d
Evaluate the implications of AI on job markets and its role in automation and productivity.
CS.HS.5.3e
Recognize the importance and challenges of human oversight in AI decision-making.
CS.HS.5.3f
Recognize the purpose and suitability of AI tools for achieving specific outcomes.
CS.HS.5.4a
Identify arguments regarding the dilemmas created by advances in artificial intelligence.
CS.HS.5.4b
Explain why computational artifacts can be attributed to an AI system rather than its initial programmers.
CS.HS.5.4c
Describe the "Turing Test" and its implications for distinguishing human and artificial intelligences.
CS.HS.5.4d
Articulate arguments against "artificial intelligence" qualifying as "actual intelligence" and counterarguments that refute those specific arguments.
CS.HS.6.1a
a. Describe how active and passive social media use can lead to positive and negative feelings.
CS.HS.6.1b
5 b. Identify research trends related to the health impact of screen time.
CS.HS.6.1c
6 c. Brainstorm strategies for navigating challenging relationships in a digital environment.
CS.HS.6.1d
8 d. Learn strategies for civil discourse in a digital environment and apply them to a scenario involving uncivil discourse.
CS.HS.6.1e
10 e. Define "digital reputation," and identify examples of social media posts that can have a positive or negative effect.
CS.HS.6.1f
12 f. Explain why you should ask permission before posting pictures or information about someone else.
CS.HS.6.1g
14 g. Identify strategies for protecting their privacy, including opting out of specific features and analyzing app or website privacy policies and terms of service.
CS.HS.6.1h
16 h. Define "misinformation" and explore the consequences of spreading misinformation online.
CS.HS.6.1i
18 i. Explore examples of confirmation bias, particularly related to news and online information.